<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Preventing NIS+ users from logging in in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567908#M30180</link>
    <description>I have a NIS+ netgroup structured as show below:&lt;BR /&gt;&lt;BR /&gt;--snip--&lt;BR /&gt;uadm     (user1,-,) (user2,-,)&lt;BR /&gt;users     uadm (user3,-,) (user4,-,)&lt;BR /&gt;--snip--&lt;BR /&gt;&lt;BR /&gt;All end-users workstations are NIS+ clients and Trusted systems.&lt;BR /&gt;Here is the expected behaviour: on workstation 1, I'd like only users belonging to map @uadm having their access granted on the system and on workstation 2, all users having normal access.&lt;BR /&gt;&lt;BR /&gt;In fact, I'd like the 'compat' behaviour for passwd and group maps (thus allowing me to select granted NIS+ users), but Trusted Systems do not support this syntax (having +/- signs into /etc/passwd before conversion).&lt;BR /&gt;&lt;BR /&gt;Any ideas?&lt;BR /&gt;&lt;BR /&gt;Thanks a lot in advance.&lt;BR /&gt;&lt;BR /&gt;Regards.&lt;BR /&gt;/Brian</description>
    <pubDate>Tue, 21 Aug 2001 10:20:10 GMT</pubDate>
    <dc:creator>Brian Kennedy</dc:creator>
    <dc:date>2001-08-21T10:20:10Z</dc:date>
    <item>
      <title>Preventing NIS+ users from logging in</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567908#M30180</link>
      <description>I have a NIS+ netgroup structured as show below:&lt;BR /&gt;&lt;BR /&gt;--snip--&lt;BR /&gt;uadm     (user1,-,) (user2,-,)&lt;BR /&gt;users     uadm (user3,-,) (user4,-,)&lt;BR /&gt;--snip--&lt;BR /&gt;&lt;BR /&gt;All end-users workstations are NIS+ clients and Trusted systems.&lt;BR /&gt;Here is the expected behaviour: on workstation 1, I'd like only users belonging to map @uadm having their access granted on the system and on workstation 2, all users having normal access.&lt;BR /&gt;&lt;BR /&gt;In fact, I'd like the 'compat' behaviour for passwd and group maps (thus allowing me to select granted NIS+ users), but Trusted Systems do not support this syntax (having +/- signs into /etc/passwd before conversion).&lt;BR /&gt;&lt;BR /&gt;Any ideas?&lt;BR /&gt;&lt;BR /&gt;Thanks a lot in advance.&lt;BR /&gt;&lt;BR /&gt;Regards.&lt;BR /&gt;/Brian</description>
      <pubDate>Tue, 21 Aug 2001 10:20:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567908#M30180</guid>
      <dc:creator>Brian Kennedy</dc:creator>
      <dc:date>2001-08-21T10:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Preventing NIS+ users from logging in</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567909#M30181</link>
      <description>Hi,&lt;BR /&gt;NIS+ wouldn't work if your system is trusted one.&lt;BR /&gt;If you wanted to achive this on your client, make the following additions in /etc/passwd file.&lt;BR /&gt;in workstation1 : at the end of the file just add +user1:::&lt;BR /&gt;    +user2:::&lt;BR /&gt;    ...&lt;BR /&gt;    ....&lt;BR /&gt;so the user1,user2,.. can only access the workstation1.&lt;BR /&gt;In workstation 2 at the end of the file just add +::: and also in /etc/group file.&lt;BR /&gt;Now workstation2 accessible for all NIS+ users.</description>
      <pubDate>Tue, 21 Aug 2001 13:33:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567909#M30181</guid>
      <dc:creator>Ravi_8</dc:creator>
      <dc:date>2001-08-21T13:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: Preventing NIS+ users from logging in</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567910#M30182</link>
      <description>Have to disagree with Ravi there - NIS+ does work in a trusted environment! &lt;BR /&gt;&lt;BR /&gt;But in answer to the question - netgroup should function exactly as it does in a NIS environment with the proviso that nsswitch.conf has the following line :&lt;BR /&gt;&lt;BR /&gt;netgroup:   nisplus files&lt;BR /&gt;&lt;BR /&gt;... or something similar? &lt;BR /&gt;&lt;BR /&gt;Why not create a group in the netgroup called machine1_ok or something like that and add that then as the + entry ?</description>
      <pubDate>Tue, 21 Aug 2001 13:43:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567910#M30182</guid>
      <dc:creator>Barry O Flanagan</dc:creator>
      <dc:date>2001-08-21T13:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: Preventing NIS+ users from logging in</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567911#M30183</link>
      <description>Hi, Barry&lt;BR /&gt;pls go thru trusted system docs, it clearly says that NIS+ wouldn't work. if it works how can the audit takes place for all the NIS+ users who logged into  system</description>
      <pubDate>Tue, 21 Aug 2001 13:59:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567911#M30183</guid>
      <dc:creator>Ravi_8</dc:creator>
      <dc:date>2001-08-21T13:59:27Z</dc:date>
    </item>
    <item>
      <title>Re: Preventing NIS+ users from logging in</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567912#M30184</link>
      <description>Ravi,&lt;BR /&gt;&lt;BR /&gt;I can assure you NIS+ and trusted systems work quite happily together. I've implemented NIS+ servers and clients, all of which were trusted systems. NIS+ keeps itself in sync with whats going on in the local /tcb/files/auth structure. So as long as you stick your nisplus entry into your nsswitch.conf then your sorted. &lt;BR /&gt;&lt;BR /&gt;What aspect of NIS+ doesn't work with trusted systems Ravi?</description>
      <pubDate>Tue, 21 Aug 2001 14:10:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567912#M30184</guid>
      <dc:creator>Barry O Flanagan</dc:creator>
      <dc:date>2001-08-21T14:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: Preventing NIS+ users from logging in</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567913#M30185</link>
      <description>Thanks for your help.&lt;BR /&gt;&lt;BR /&gt;Auditing works perfectly well for me too, even if my system is trusted and a NIS+ client.&lt;BR /&gt;&lt;BR /&gt;Barry, the + entry (in fact, the "compat" mode) does not work when the system has previously been tsconvert'd. I thought there were another way just to prevent user1 and user2 from logging into workstation1, while they can log into workstation2; a way to "disable" certain accounts on workstation1 but not on workstation2, considering that both workstations are NIS+ clients of the same NIS+ domain.&lt;BR /&gt;&lt;BR /&gt;Any ideas?&lt;BR /&gt;TIA&lt;BR /&gt;&lt;BR /&gt;/Brian</description>
      <pubDate>Tue, 21 Aug 2001 14:30:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567913#M30185</guid>
      <dc:creator>Brian Kennedy</dc:creator>
      <dc:date>2001-08-21T14:30:40Z</dc:date>
    </item>
    <item>
      <title>Re: Preventing NIS+ users from logging in</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567914#M30186</link>
      <description>The only thing I can think of is to set up sub-domains. Make machine1 a member of subdomain1 and machine 2 a member of subdomain2 - then the fact that each user or NIS+ principal must have a local credential in that domain in order to view objects in it, should remove visability of the more restricted machine from users that dont have a cred. &lt;BR /&gt;&lt;BR /&gt;Its worth a shot!! Otherwise dump NIS+ and go back to good old NIS. ;-)&lt;BR /&gt;&lt;BR /&gt;B</description>
      <pubDate>Wed, 22 Aug 2001 13:41:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/preventing-nis-users-from-logging-in/m-p/2567914#M30186</guid>
      <dc:creator>Barry O Flanagan</dc:creator>
      <dc:date>2001-08-22T13:41:07Z</dc:date>
    </item>
  </channel>
</rss>

